Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to liaise with internal and external personnel on technical, operational and business-related matters
literacy skills to:
interpret technical documentation
write reports as required
numeracy skills to:
take test measurements
interpret results
evaluate performance and interoperability of network
planning and organisational skills to:
coordinate the process in liaison with others
plan, prioritise and monitor own work
problem-solving and contingency-management skills to:
adapt configuration procedures to network requirements
reconfigure depending on differing operational contingencies, risk situations and environments
problem-solving skills to troubleshoot
research skills to investigate appropriate hardware to meet requirements
technical skills to:
select and configure networking devices
assess and implement security requirements.
Required knowledge
access control lists, configuration and troubleshooting
authentication protocols
encryption techniques
IDS and IPS
IOS and IP networking models and protocols
current wireless regulations, standards and certifications
local area network (LAN) or wide area network (WAN) implementations
malicious attacks and prevention techniques
network management tools
network security prevention methods
procedures to configure, verify and troubleshoot:
switch with VLANs and inter-switching communications
router
procedures to set up VPNs
routing protocols
threat and attack mitigation techniques
use of command line interface to configure and test network elements.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Network may include: | data internet protocol large and small LANs virtual LAN (VLAN) WANs. |
Tools may include: | Cisco security device manager (SDM) command line interface (CLI) web interface. |
Administration access may include: | multiple privilege levels role-based CLI strong-encrypted passwords. |
Features of TACACS+ and RADIUS AAA protocols may include: | remote authentication dial-in user service (RADIUS): combines authentication and authorisation does not allow users to control which commands can be executed on a router does not support ARA access, NetBIOS Frame Protocol Control Protocol, NASI, and X.25 PAD connections encrypts only the password in the access-request packet uses industry standard uses UDP TACACS+: encrypts the entire body of the packet is Cisco proprietary offers multiprotocol support provides two ways to control the authorisation of router commands on a per-user or per-group basis uses transmission control protocol (TCP) uses the AAA architecture, which separates authentication, authorisation and accounting. |
Access control lists may include: | extended named standard. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist